Behavioral task
behavioral1
Sample
4236-3-0x0000000000FD0000-0x0000000001498000-memory.exe
Resource
win7-20240508-en
General
-
Target
4236-3-0x0000000000FD0000-0x0000000001498000-memory.dmp
-
Size
4.8MB
-
MD5
cde63446aeb41ce384166f28e9001cdc
-
SHA1
703b99ab4a93d07655c24fd9fe51e3849efc99de
-
SHA256
10d20ab7c6f116c1fe3d917b6eb8ab8b962e34b374bae72021d567be66faca3a
-
SHA512
ef94e603e0d5138a931566419baa9c0b1c5646d8d6449243bdb6a1b7a4a45e0e56a69a6bb141f329a1552c9c967b93316f83293c76a5025127c9454bbce20ae5
-
SSDEEP
49152:eO7xxTUrhOwlo6jDfDLXhAGf+YyCQRhGLtQkDABK+lfONFqmbGtQQ+uKFmSp5fe:xxxTUA6PDLRAGf+TQMBBfyF9rVmqs
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4236-3-0x0000000000FD0000-0x0000000001498000-memory.dmp
Files
-
4236-3-0x0000000000FD0000-0x0000000001498000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 182KB - Virtual size: 408KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
okaifnjw Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ghxkwnhx Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE